Results 21 to 30 of about 101,732 (243)

Inconsistency of the Wolf sunspot number series around 1848 [PDF]

open access: yes, 2013
Aims. Sunspot number is a benchmark series in many studies, but may still contain inhomogeneities and inconsistencies. In particular, an essential discrepancy exists between the two main sunspot number series, Wolf (WSN) and group (GSN) sunspot numbers ...
Arlt, R.   +3 more
core   +1 more source

ELIMINATION OF DATA MODIFICATION IN SENSOR NODES OF WSN USING DEEP LEARNING MODEL

open access: yesICTACT Journal on Communication Technology, 2022
This study focuses on removing the possibility of malicious data manipulation in wireless sensor networks (WSN) by utilising a deep learning method. When training deep neural networks, datasets that have been the subject of an attack that alters the data
B Chellapraba   +3 more
doaj   +1 more source

Process-Based Design and Integration of Wireless Sensor Network Applications [PDF]

open access: yes, 2012
Wireless Sensor and Actuator Networks (WSNs) are distributed sensor and actuator networks that monitor and control real-world phenomena, enabling the integration of the physical with the virtual world.
Casati, Fabio   +10 more
core   +5 more sources

Fisher Information of Mine Collapse Hole Detection Based on Sensor Nodes Connectivity

open access: yesInternational Journal of Distributed Sensor Networks, 2013
It is very important to detect a collapse hole for coal mine workers. The possibility of detecting the collapse hole using WSN is presented because the tunnel in coal mine is narrow and has poor working condition.
Shengbo Hu, Heng Shu, Xiaowei Song
doaj   +1 more source

Integrating Software Engineering Processes in the Development of Efficient Intrusion Detection Systems in Wireless Sensor Networks

open access: yesSensors, 2020
Applying Software Engineering (SE) processes is vital to critical and complex systems including security and networking systems. Nowadays, Wireless Sensor Networks (WSNs) and their applications are found in many military and civilian systems which make ...
Iman Almomani, Afnan Alromi
doaj   +1 more source

Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks [PDF]

open access: yes, 2009
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. WMN is an emerging community based integrated broadband wireless network which ensures high bandwidth ubiquitous internet provision to users, while, WSN ...
Loo, KK, Naeem, T
core   +1 more source

Localization in Wireless Sensor Networks: A Review

open access: yesCybernetics and Information Technologies, 2020
Wireless Sensor Network (WSN) has been a source of attraction for many researchers as well as common people for the past few years. The use of WSN in various environmental applications like monitoring of weather, temperature, humidity, military ...
Sneha V., Nagarajan M.
doaj   +1 more source

Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]

open access: yes, 2015
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet   +4 more
core   +1 more source

Symbiotic Organism Search Algorithm with Multi-Group Quantum-Behavior Communication Scheme Applied in Wireless Sensor Networks

open access: yesApplied Sciences, 2020
The symbiotic organism search (SOS) algorithm is a promising meta-heuristic evolutionary algorithm. Its excellent quality of global optimization solution has aroused the interest of many researchers.
Shu-Chuan Chu   +2 more
doaj   +1 more source

A Balanced Intrusion Detection System for Wireless Sensor Networks in a Big Data Environment Using CNN-SVM Model

open access: yesИнформатика и автоматизация, 2023
Wireless Sensor Networks (WSNs) were exposed to several distinct safety issues and attacks regarding gathering and sending data. In this scenario, one of the most prevalent WSN assaults that may target any tier of the protocol stack is the Denial of ...
Kuraganty Phani Rama Krishna   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy